CVE-2008-3106

Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.
References
Link Resource
http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
http://marc.info/?l=bugtraq&m=122331139823057&w=2
http://secunia.com/advisories/31010 Vendor Advisory
http://secunia.com/advisories/31320
http://secunia.com/advisories/31497
http://secunia.com/advisories/31600
http://secunia.com/advisories/31736
http://secunia.com/advisories/32018
http://secunia.com/advisories/32179
http://secunia.com/advisories/32180
http://secunia.com/advisories/32436
http://secunia.com/advisories/33237
http://secunia.com/advisories/33238
http://secunia.com/advisories/37386
http://security.gentoo.org/glsa/glsa-200911-02.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1
http://support.apple.com/kb/HT3179
http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717
http://www.redhat.com/support/errata/RHSA-2008-0594.html
http://www.redhat.com/support/errata/RHSA-2008-0790.html
http://www.redhat.com/support/errata/RHSA-2008-0906.html
http://www.redhat.com/support/errata/RHSA-2008-1044.html
http://www.redhat.com/support/errata/RHSA-2008-1045.html
http://www.securityfocus.com/archive/1/497041/100/0/threaded
http://www.securityfocus.com/bid/30143
http://www.securitytracker.com/id?1020457
http://www.us-cert.gov/cas/techalerts/TA08-193A.html US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0016.html
http://www.vupen.com/english/advisories/2008/2056/references
http://www.vupen.com/english/advisories/2008/2740
https://exchange.xforce.ibmcloud.com/vulnerabilities/43658
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10866
http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html
http://marc.info/?l=bugtraq&m=122331139823057&w=2
http://secunia.com/advisories/31010 Vendor Advisory
http://secunia.com/advisories/31320
http://secunia.com/advisories/31497
http://secunia.com/advisories/31600
http://secunia.com/advisories/31736
http://secunia.com/advisories/32018
http://secunia.com/advisories/32179
http://secunia.com/advisories/32180
http://secunia.com/advisories/32436
http://secunia.com/advisories/33237
http://secunia.com/advisories/33238
http://secunia.com/advisories/37386
http://security.gentoo.org/glsa/glsa-200911-02.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1
http://support.apple.com/kb/HT3179
http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717
http://www.redhat.com/support/errata/RHSA-2008-0594.html
http://www.redhat.com/support/errata/RHSA-2008-0790.html
http://www.redhat.com/support/errata/RHSA-2008-0906.html
http://www.redhat.com/support/errata/RHSA-2008-1044.html
http://www.redhat.com/support/errata/RHSA-2008-1045.html
http://www.securityfocus.com/archive/1/497041/100/0/threaded
http://www.securityfocus.com/bid/30143
http://www.securitytracker.com/id?1020457
http://www.us-cert.gov/cas/techalerts/TA08-193A.html US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0016.html
http://www.vupen.com/english/advisories/2008/2056/references
http://www.vupen.com/english/advisories/2008/2740
https://exchange.xforce.ibmcloud.com/vulnerabilities/43658
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10866
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*
cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*
cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*
cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html - () http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html -
References () http://marc.info/?l=bugtraq&m=122331139823057&w=2 - () http://marc.info/?l=bugtraq&m=122331139823057&w=2 -
References () http://secunia.com/advisories/31010 - Vendor Advisory () http://secunia.com/advisories/31010 - Vendor Advisory
References () http://secunia.com/advisories/31320 - () http://secunia.com/advisories/31320 -
References () http://secunia.com/advisories/31497 - () http://secunia.com/advisories/31497 -
References () http://secunia.com/advisories/31600 - () http://secunia.com/advisories/31600 -
References () http://secunia.com/advisories/31736 - () http://secunia.com/advisories/31736 -
References () http://secunia.com/advisories/32018 - () http://secunia.com/advisories/32018 -
References () http://secunia.com/advisories/32179 - () http://secunia.com/advisories/32179 -
References () http://secunia.com/advisories/32180 - () http://secunia.com/advisories/32180 -
References () http://secunia.com/advisories/32436 - () http://secunia.com/advisories/32436 -
References () http://secunia.com/advisories/33237 - () http://secunia.com/advisories/33237 -
References () http://secunia.com/advisories/33238 - () http://secunia.com/advisories/33238 -
References () http://secunia.com/advisories/37386 - () http://secunia.com/advisories/37386 -
References () http://security.gentoo.org/glsa/glsa-200911-02.xml - () http://security.gentoo.org/glsa/glsa-200911-02.xml -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1 -
References () http://support.apple.com/kb/HT3179 - () http://support.apple.com/kb/HT3179 -
References () http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm - () http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm - () http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm - () http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm - () http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm -
References () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014 - () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014 -
References () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717 - () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717 -
References () http://www.redhat.com/support/errata/RHSA-2008-0594.html - () http://www.redhat.com/support/errata/RHSA-2008-0594.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0790.html - () http://www.redhat.com/support/errata/RHSA-2008-0790.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0906.html - () http://www.redhat.com/support/errata/RHSA-2008-0906.html -
References () http://www.redhat.com/support/errata/RHSA-2008-1044.html - () http://www.redhat.com/support/errata/RHSA-2008-1044.html -
References () http://www.redhat.com/support/errata/RHSA-2008-1045.html - () http://www.redhat.com/support/errata/RHSA-2008-1045.html -
References () http://www.securityfocus.com/archive/1/497041/100/0/threaded - () http://www.securityfocus.com/archive/1/497041/100/0/threaded -
References () http://www.securityfocus.com/bid/30143 - () http://www.securityfocus.com/bid/30143 -
References () http://www.securitytracker.com/id?1020457 - () http://www.securitytracker.com/id?1020457 -
References () http://www.us-cert.gov/cas/techalerts/TA08-193A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-193A.html - US Government Resource
References () http://www.vmware.com/security/advisories/VMSA-2008-0016.html - () http://www.vmware.com/security/advisories/VMSA-2008-0016.html -
References () http://www.vupen.com/english/advisories/2008/2056/references - () http://www.vupen.com/english/advisories/2008/2056/references -
References () http://www.vupen.com/english/advisories/2008/2740 - () http://www.vupen.com/english/advisories/2008/2740 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43658 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43658 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10866 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10866 -

Information

Published : 2008-07-09 23:41

Updated : 2024-11-21 00:48


NVD link : CVE-2008-3106

Mitre link : CVE-2008-3106

CVE.ORG link : CVE-2008-3106


JSON object : View

Products Affected

sun

  • jre
  • jdk
CWE
CWE-264

Permissions, Privileges, and Access Controls